{"id":382,"date":"2024-04-10T22:02:12","date_gmt":"2024-04-10T22:02:12","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/kwild010\/?p=382"},"modified":"2024-04-10T22:02:12","modified_gmt":"2024-04-10T22:02:12","slug":"journal-entry-5","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/kwild010\/2024\/04\/10\/journal-entry-5\/","title":{"rendered":"Journal Entry 5"},"content":{"rendered":"\n<p><strong>Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity.\u00a0<\/strong><\/p>\n\n\n\n<p><strong>C<\/strong>reate a password manager app<\/p>\n\n\n\n<p><strong>Y<\/strong>ield management software development develops software solutions for managing and optimizing cybersecurity resources and operations<\/p>\n\n\n\n<p><strong>B<\/strong>iometric Authentication is an app someone can create<\/p>\n\n\n\n<p><strong>E<\/strong>thical hacking services<\/p>\n\n\n\n<p><strong>R<\/strong>egulatory compliance consultant is something you can become<\/p>\n\n\n\n<p><strong>S<\/strong>ell online courses or workshops that covers many aspects of cybersecurity <\/p>\n\n\n\n<p><strong>E<\/strong>ndpoint security solutions is something you can be apart of as you develop and sell software solutions for protecting endpoints from cyber threats<\/p>\n\n\n\n<p><strong>C<\/strong>reate a security scanner app <\/p>\n\n\n\n<p><strong>U<\/strong>ser authentication solutions is something you can develop and sell<\/p>\n\n\n\n<p><strong>R<\/strong>isk assessment services is something you can offer to businesses<\/p>\n\n\n\n<p><strong>I<\/strong>ncident response services is a service you can provide businesses<\/p>\n\n\n\n<p><strong>T<\/strong>hreat intelligence platforms are something you can create and sell<\/p>\n\n\n\n<p><strong>Y<\/strong>ou can create an online store selling cybersecurity hardware <strong><br><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity.\u00a0 Create a password manager app Yield management software development develops software solutions for managing and optimizing cybersecurity resources and operations Biometric Authentication is an app someone can create Ethical hacking services Regulatory compliance consultant is something you can become&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/kwild010\/2024\/04\/10\/journal-entry-5\/\">Read More<\/a><\/div>\n","protected":false},"author":28245,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/kwild010\/wp-json\/wp\/v2\/posts\/382"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/kwild010\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/kwild010\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kwild010\/wp-json\/wp\/v2\/users\/28245"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kwild010\/wp-json\/wp\/v2\/comments?post=382"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/kwild010\/wp-json\/wp\/v2\/posts\/382\/revisions"}],"predecessor-version":[{"id":383,"href":"https:\/\/sites.wp.odu.edu\/kwild010\/wp-json\/wp\/v2\/posts\/382\/revisions\/383"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/kwild010\/wp-json\/wp\/v2\/media?parent=382"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kwild010\/wp-json\/wp\/v2\/categories?post=382"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kwild010\/wp-json\/wp\/v2\/tags?post=382"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}